News Another AMD Zen 'Secure Encrypted Virtualization' Vulnerability Demonstrated by Researchers

jgraham11

Distinguished
Jan 15, 2010
54
21
18,535
Not only do you need physical access you must of modified the motherboard to vary the voltage being supplied to the processor. This article is misleading in that the motherboard voltage modulation is required and brushed over and only physical access is stated which is not the same as having server covers removed and the soldering iron is out... I don't think this is much of a real threat.

Not even in the same realm as Intel bugs, some can be executed just by visiting a website. Keep your systems updated!
 

escksu

Reputable
BANNED
Aug 8, 2019
878
354
5,260
Not only do you need physical access you must of modified the motherboard to vary the voltage being supplied to the processor. This article is misleading in that the motherboard voltage modulation is required and brushed over and only physical access is stated which is not the same as having server covers removed and the soldering iron is out... I don't think this is much of a real threat.

Not even in the same realm as Intel bugs, some can be executed just by visiting a website. Keep your systems updated!

You dont need a modified motherboard to vary voltage today. All boards are able to control the clockspeed and voltage on both BIOS and OS level. Physcial access. Again, its not that difficult because administrators arent the only threats. You still need people to service your servers, racks (Eg. wiring, hardware replacement). Even server rooms (eg. lights, aircondition, ducts servicing).